Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?

During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk...

July 15, 2023 No Comments READ MORE +

Which of the following cryptographic techniques would BEST meet the requirement?

A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned...

July 15, 2023 No Comments READ MORE +

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?A . Unsecured root accounts B. Zero day C. Shared tenancy D. Insider threatView AnswerAnswer: C Explanation: When hosting applications in the public cloud, there is a risk of shared tenancy, meaning that multiple...

July 15, 2023 No Comments READ MORE +

Which of the following will be BEST remediation to prevent this vulnerability?

A dynamic application vulnerability scan identified code injection could be performed using a web form. Which of the following will be BEST remediation to prevent this vulnerability?A . Implement input validations B. Deploy MFA C. Utilize a WAF D. Configure HIPSView AnswerAnswer: A Explanation: Implementing input validations will prevent code...

July 15, 2023 No Comments READ MORE +

Which of the following was the MOST likely cause?

A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later, enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?A . Shadow IT...

July 15, 2023 No Comments READ MORE +

Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?

A security analyst needs an overview of vulnerabilities for a host on the network. Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?A . Non-credentialed B. Web application C. Privileged D. InternalView AnswerAnswer: C Explanation: Privileged scanning,...

July 14, 2023 No Comments READ MORE +

Which of the following involves the inclusion of code in the main codebase as soon as it is written?

Which of the following involves the inclusion of code in the main codebase as soon as it is written?A . Continuous monitoring B. Continuous deployment C. Continuous Validation D. Continuous integrationView AnswerAnswer: D Explanation: Continuous Integration (CI) is a practice where developers integrate code into a shared repository frequently, preferably...

July 14, 2023 No Comments READ MORE +

Which of the following should the administrator consider?

A security administrator is working on a solution to protect passwords stored in a database against rainbow table attacks. Which of the following should the administrator consider?A . Hashing B. Salting C. Lightweight cryptography D. SteganographyView AnswerAnswer: B Explanation: Salting is a technique that adds random data to a password...

July 14, 2023 No Comments READ MORE +

Which of the following should the organization ensure is Installed on all laptops?

An organization wants to enable built-in FDE on all laptops. Which of the following should the organization ensure is Installed on all laptops?A . TPM B. CA C. SAML D. CRLView AnswerAnswer: A Explanation: The organization should ensure that a Trusted Platform Module (TPM) is installed on all laptops in...

July 14, 2023 No Comments READ MORE +

Which of the following security controls would work BEST to prevent this from happening?

A company is concerned about individuals dnvmg a car into the building to gam access. Which of the following security controls would work BEST to prevent this from happening?A . Bollard B. Camera C. Alarms D. Signage E. Access control vestibuleView AnswerAnswer: A Explanation: A bollard would work best to...

July 14, 2023 No Comments READ MORE +